Conference Reducing contention through priority updates 2013 152-163 Shun J, Blelloch GE, Fineman JT, Gibbons PB
Journal Article The Convergence of Machine and Biological Intelligence 2013 • IEEE Intelligent Systems • 28(5):28-33 Wu Z, Reddy R, Wu Z, Pan G, Zheng N
Journal Article Fast Structuring of Radio Networks Large for Multi-message Communications 2013 • Lecture Notes in Computer Science • 8205:492-506 Ghaffari M, Haeupler B
Preprint Expressing Ethnicity through Behaviors of a Robot Character 2013 Makatchev M, Simmons R, Sakr M, Ziadee M
Conference Clustering under Approximation Stability 2013 • Journal of the ACM • 60(2): Balcan M-F, Blum A, Gupta A
Journal Article Evaluating the Distinctiveness and Attractiveness of Human Motions on Realistic Virtual Bodies 2013 • ACM Transactions on Graphics • 32(6): Hoyet L, Ryall K, Zibrek K, Park H, Lee J, Hodgins J, O'Sullivan C
Conference Using IF-scale delays to emulate the effects of site-specific multipath in a digital wireless channel emulator 2013 41-48 Matusiak J, Graham R, Taylor K, Anderson E, Walker B
Journal Article Style and Abstraction in Portrait Sketching 2013 • ACM Transactions on Graphics • 32(4): Berger I, Shamir A, Mahler M, Carter E, Hodgins J
Preprint Low latency via redundancy 2013 Vulimiri A, Godfrey PB, Mittal R, Sherry J, Ratnasamy S, Shenker S
Conference Audit games 2013 • IJCAI International Joint Conference on Artificial Intelligence • 41-47 Blocki J, Christin N, Datta A, Procaccia AD, Sinha A
Conference Maneuver-Based Autonomous Navigation of a Small Fixed-Wing UAV 2013 • IEEE International Conference on Robotics and Automation • 3961-3968 Hwangbo M, Kanade T
Conference Classifier Introducing Transition Likelihood Model Based on Quantization Residual 2013 • 2013 SECOND IAPR ASIAN CONFERENCE ON PATTERN RECOGNITION (ACPR 2013) • 272-277 Yamauchi Y, Kanade T, Fujiyoshi H
Conference A Reference Architecture for Mobile Code Offload in Hostile Environments 2013 • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering • 110:274-293 Simanta S, Ha K, Lewis G, Morris E, Satyanarayanan M
Conference Authentication for Resilience: The Case of SDN 2013 • Lecture Notes in Computer Science • 8263:39-44 Yu D, Moore AW, Hall C, Anderson R
Conference NetSpot: Spotting Significant Anomalous Regions on Dynamic Networks 2013 28-36 Mongiovì M, Bogdanov P, Ranca R, Papalexakis EE, Faloutsos C, Singh AK
Conference Understanding internet video viewing behavior in the wild 2013 • Performance Evaluation Review • 41(1):379-380 Balachandran A, Sekar V, Akella A, Seshan S
Conference Patterns amongst Competing Task Frequencies: Super-Linearities, and the Almond-DG Model 2013 • Lecture Notes in Computer Science • 7818:201-212 Koutra D, Koutras V, Prakash BA, Faloutsos C
Journal Article Competing Memes Propagation on Networks: A Network Science Perspective 2013 • IEEE Journal on Selected Areas in Communications • 31(6):1049-1060 Wei X, Valler NC, Prakash BA, Neamtiu I, Faloutsos M, Faloutsos C
Journal Article Explicit rank-metric codes list-decodable with optimal redundancy 2013 Guruswami V, Wang C
Journal Article RESTRICTED ISOMETRY OF FOURIER MATRICES AND LIST DECODABILITY OF RANDOM LINEAR CODES 2013 • SIAM journal on computing (Print) • 42(5):1888-1914 Cheraghchi M, Guruswami V, Velingker A
Book Introduction 2013 • SpringerBriefs in Computer Science • 0(9781447148890):1-6 Cordeiro RLF, Faloutsos C, Traina Júnior C
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2013 • PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE) • 41-50 Jha S, Fredrikson M, Christodoresu M, Sailer R, Yan X
Conference A nonparametric mixture model for topic modeling over time 2013 • Proceedings of the 2013 SIAM International Conference on Data Mining Sdm 2013 • 530-538 Dubey A, Hefny A, Williamson S, Xing EP
Conference Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring 2013 • Proceedings of the 22nd Usenix Security Symposium • 353-368 Schwartz EJ, Lee JH, Woo M, Brumley D
Conference Challenges in Developing a Software Architecture Evolution Tool as a Plug-In 2013 • International Workshop on Developing Tools as Plug-Ins, TOPI • 13-18 Barnes JM, Garlan D
Chapter Brief Encounters with a Random Key Graph 2013 • Lecture Notes in Computer Science • 7028:157-161 Gligor VD, Perrig A, Zhao J
Conference Block regularized lasso for multivariate multi-response linear regression 2013 • Journal of machine learning research • 31:608-617 Wang W, Liang Y, Xing EP
Conference Expressing ethnicity through behaviors of a robot character. 2013 • HRI • 357-364 Makatchev M, Simmons RG, Sakr MF, Ziadee M
Conference Space-Efficient, High-Performance Rank and Select Structures on Uncompressed Bit Sequences 2013 • Lecture Notes in Computer Science • 7933:151-163 Zhou D, Andersen DG, Kaminsky M
Conference Stronger semantics for low-latency geo-replicated storage 2013 • Proceedings of the 10th Usenix Symposium on Networked Systems Design and Implementation Nsdi 2013 • 313-328 Lloyd W, Freedman MJ, Kaminsky M, Andersen DG
Conference Finding objects through stochastic shortest path problems 2013 • 12th International Conference on Autonomous Agents and Multiagent Systems 2013 Aamas 2013 • 1:547-554 Trevizan FW, Veloso MM
Conference Specialized storage for big numeric time series 2013 • 5th USENIX Workshop on Hot Topics in Storage and File Systems, HotStorage 2013 Shafer I, Sambasivan RR, Rowe A, Ganger GR
Conference I/O acceleration with pattern detection 2013 25-36 He J, Bent J, Torres A, Grider G, Gibson G, Maltzahn C, Sun X-H
Journal Article Software model synthesis using satisfiability solvers 2013 • Empirical Software Engineering • 18(4):825-856 Heule MJH, Verwer S
Conference Efficient BVH construction via approximate agglomerative clustering 2013 81-88 Gu Y, He Y, Fatahalian K, Blelloch G
Conference Estimating Human Interest and Attention via Gaze Analysis 2013 • IEEE International Conference on Robotics and Automation • 4350-4355 Knight H, Simmons R
Preprint The Power of Localization for Efficiently Learning Linear Separators with Noise 2013 Awasthi P, Balcan MF, Long PM
Conference Exact analysis of the M/M/k/setup class of Markov chains via recursive renewal reward 2013 • Performance Evaluation Review • 41(1):153-166 Gandhi A, Doroudi S, Harchol-Balter M, Scheller-Wolf A
Journal Article On a sparse random graph with minimum degree three: Likely Pósa sets are large 2013 Frieze A, Pittel B
Conference Harnessing the power of two crossmatches 2013 123-140 Blum A, Gupta A, Procaccia A, Sharma A
Conference Controlling Data Flow with a Policy-Based Programming Language for the Web 2013 • Lecture Notes in Computer Science • 8208:215-230 Sans T, Cervesato I, Hussein S
Conference Throwing darts: Random sampling helps tree search when the number of short certificates is moderate 2013 • Aaai Workshop Technical Report • WS-13-17:17-19 Dickerson JP, Sandholm T
Conference Defender (Mis)coordination in security games 2013 • IJCAI International Joint Conference on Artificial Intelligence • 220-226 Jiang AX, Procaccia AD, Qian Y, Shah N, Tambe M
Conference NetSpot: Spotting significant anomalous regions on dynamic networks 2013 • Proceedings of the 2013 SIAM International Conference on Data Mining, SDM 2013 • 28-36 Mongiovì M, Bogdanov P, Ranca R, Papalexakisy EE, Faloutsos C, Singh AK